¶ … computer systems are increasingly being used to cause widespread damage, with nation-states or individuals sponsored by nation-states making use of malicious codes to compromise 'enemy' information systems. In essence, cyber warfare has got to do with the attack on the information networks, computers, or infrastructure of another entity by an international organization or nation-state. In the context of this discussion, cyber war will be taken as the utilization of "coordinated attacks to specific critical sectors of a country" (Edwards, 2014, p. 67). The key aim of such attacks is usually sabotage or espionage. This text concerns itself with cyber warfare. In so doing, it will amongst other things analyze a journal article titled, Stuxnet: Dissecting a Cyber Warfare Weapon, by Ralph Langner. More specifically, the text will conduct a technical analysis of the said article and discuss not only the offensive and defensive Cyberware strategy, but also make recommendations on how to prevent or avert future Cyberware attacks. The relevance of this discussion cannot be overstated, particularly given that going forward; there is a high likelihood of the proliferation of more sophisticated variants of Stuxnet.
Background
Discovered sometime in mid-2010, Stuxnet, a sophisticated form of malicious software, was "the first demonstration, in the real world, of the capability of software to have a malicious physical effect" (Rosenzweig, 2013, p. 2). As a matter of fact, before the discovery of this potent cyber weapon, the mantra of most of those in the cyber and computer security realm, as Rosenzweig (2013, p. 2) further points out was, "cyber war only kills a bunch of little baby electrons." The discovery of Stuxnet, therefore, came as a real surprise, with most coming to the realization that cyber weapons like these had a real threat on physical infrastructure and, perhaps, human life as well, or what Rosenzweig refers to as "real babies."
In essence, Stuxnet was responsible for the destruction of numerous centrifuges that were being used for the enrichment of uranium (classified as weapons-grade) in Iran's Natanz nuclear facility. This it did by, amongst other things, triggering the acceleration of electric motors to speeds that were essentially dangerous -- turning the clock, with regard to the progress the country had made on its nuclear program, two years back. In a nutshell, this particular malicious software infected a physical manufacturing plant and made it malfunction, by triggering the breakdown of machines (Rosenzweig, 2013). This nature of the attack was unlike anything ever experienced before. Although the damage occasioned by Stuxnet was nowhere near severe, especially with regard to loss of lives, it was "figuratively, the first explosion of a cyber atomic bomb" (Rosenzweig, 2013).
Later on, in 2003, the Stuxnet cyber-attack was, according to the Global Research- Center for Research and Globalization (2013), termed an "act of force" by NATO. It is important to note that as the Tallinn Manual on the Law (international) relevant to Cyber Warfare observes, "acts that kill or injure persons or destroy or damage objects are unambiguously uses of force" (Global Research, 2013).
Stuxnet -- Dissecting a Cyberwarfare Weapon by Ralph Langner: A Technical Analysis of the Content, Implications and Conclusions
From the onset, Ralph Langner, the author of the article under consideration points out that "not only was Stuxnet much more complex than any piece of malware seen before, it also followed a completely new approach..." This is to say that this new form of malware took everyone totally by surprise. As a matter of fact, the approach taken by Stuxnet, as Langner further points out, did not, in any way, align with the "conventional confidentiality, integrity, and availability thinking" at the time. It is important to note that, contrary to what most people thought or believed, Stuxnet did not concern itself with the manipulation of data or espionage. Neither did it erase any information. Instead, as Langner notes, this particular form of malware sought to "physically destroy a military target -- not just metaphorically, but literary." I have discussed the damage occasioned by the Stuxnet in the background section of this text. In his well written article, Langner delves deeper and seek to demonstrate just how Stuxnet managed to cause such damage.
Langner begins by debunking two popular myths regarding Stuxnet. To begin with, he points out that the assertion that SCADA systems were the specific targets of Stuxnet is largely untrue. The role SCADA systems played in this case was simply that of distribution. On this front, the attack, the real...
According to Paul B. Mckimmy (2003), "The first consideration of wireless technology is bandwidth. 802.11b (one of four existing wireless Ethernet standards) is currently the most available and affordable specification. It allows a maximum of 11 megabits per second (Mbps)" (p. 111); the author adds that wired Ethernet LANs are typically 10 or 100 Mbps. In 1997, when the IEEE 802.11 standard was first ratified, wireless LANs were incompatible and
Computer Technology Best Used in the Design Process? The Design Process of a Forty-Five Foot Sailing Boat' Computers are now being used in a growing number of applications. Computers have become a part of almost every academic discipline and area of expertise that anyone can imagine. Computer programs can perform many tasks more quickly and in some cases better than a human can. Computers allow us to see objects from all
Computers Are an Underutilized Resource for High School Physical Education Teachers Computers have become an integral part of the high school learning environment, beginning in the early 1990s. They provide a vast variety of resources to help enhance student education through presentation of material in a variety of media and act as an enhancement to teacher lessons. They can sometimes free teachers from routine tasks, allowing them to bring greater depth
System Analysis of T-SYSTEM Because of its ability to improve the quality and delivery of health care services, the Electronic Health Record is becoming a necessity in almost every healthcare organization. The purpose of this paper is to explain the impact of having an electronic health record system in an emergency department. The current computerized system used at Suny Downstate Hospital in Brooklyn is called T-SYSTEM, and has been in operation
Studies suggest that even "more "omniscient" technology is likely to be developed" in the near future (Lyon, 2002). Cookies were perhaps the first form of internet surveillance, developed in 1994 as a means for websites to track visitors logging in so they could provide more optimal service (Lyon, 2002). Now cookies have transformed the shape of communication and have further advanced the ability of criminals to survey individual user functions
This report will hopefully pull together the research available with regard to this issue, and also identify what users are most at risk for virus attacks. The research currently available also confirms that modern viruses are becoming more insidious and complex, with the potential to incur more damage to computers and data than in the past. Studies suggest that newer versions of viruses may escape detection using standard anti-viral software.
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now